no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Commercial use of cryptography in the shell companies
|
Mansfield, Nick |
|
1997 |
2 |
3 |
p. 18-20 3 p. |
article |
2 |
Introduction
|
Hardy, Gary |
|
1997 |
2 |
3 |
p. 1- 1 p. |
article |
3 |
Network security: Anything but bulletproof
|
Klaus, Christopher W. |
|
1997 |
2 |
3 |
p. 28-32 5 p. |
article |
4 |
Report highlights
|
|
|
1997 |
2 |
3 |
p. 2-7 6 p. |
article |
5 |
Security issues in today's corporate network
|
Sherwood, John |
|
1997 |
2 |
3 |
p. 8-17 10 p. |
article |
6 |
Should TTPs be licensed?
|
Walker, John |
|
1997 |
2 |
3 |
p. 21-27 7 p. |
article |
7 |
Strategic security for IP networks
|
Ranum, Marcus J. |
|
1997 |
2 |
3 |
p. 46-52 7 p. |
article |
8 |
The relevance of penetration testing to corporate network security
|
Hardy, Gary |
|
1997 |
2 |
3 |
p. 80-86 7 p. |
article |
9 |
Thinking about firewalls V2.0: Beyond perimeter security
|
Ranum, Marcus J |
|
1997 |
2 |
3 |
p. 33-45 13 p. |
article |
10 |
Unix network security
|
McNamarra, Roy |
|
1997 |
2 |
3 |
p. 66-79 14 p. |
article |
11 |
Windows NT security
|
White, Ian |
|
1997 |
2 |
3 |
p. 53-65 13 p. |
article |